From f927d1d7d366fb4d2374b203eb59752947fe90f6 Mon Sep 17 00:00:00 2001
From: Ruslaideemin
Date: Fri, 2 Aug 2013 09:06:20 +1000
Subject: [PATCH 1/2] Increase exploit reliability
From some limited testing, it appears that this exploit is
missing \x0d\x0a in the bad chars. If the generated payload / hunter
or egg contain that combination, it seems to cause reliability issues
and exploitation fails.
The home page for this software can be found at
http://www.leighb.com/intrasrv.htm
---
modules/exploits/windows/http/intrasrv_bof.rb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/modules/exploits/windows/http/intrasrv_bof.rb b/modules/exploits/windows/http/intrasrv_bof.rb
index 41861f0ea4..e22018dd3a 100644
--- a/modules/exploits/windows/http/intrasrv_bof.rb
+++ b/modules/exploits/windows/http/intrasrv_bof.rb
@@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote
{
'Space' => 4660,
'StackAdjustment' => -3500,
- 'BadChars' => "\x00"
+ 'BadChars' => "\x00\x0d\x0a"
},
'DefaultOptions' =>
{
From a45f49e3b75afd3e31b556b8c7720b25ebd2ca36 Mon Sep 17 00:00:00 2001
From: jvazquez-r7
Date: Fri, 23 Aug 2013 08:49:58 -0500
Subject: [PATCH 2/2] Use a new Ranking
---
modules/exploits/windows/http/intrasrv_bof.rb | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/modules/exploits/windows/http/intrasrv_bof.rb b/modules/exploits/windows/http/intrasrv_bof.rb
index e22018dd3a..8fe92902a8 100644
--- a/modules/exploits/windows/http/intrasrv_bof.rb
+++ b/modules/exploits/windows/http/intrasrv_bof.rb
@@ -8,7 +8,7 @@
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
- Rank = NormalRanking
+ Rank = ManualRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Egghunter